Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
The Optimal way to create a protocol in Wireless Mesh Networks
is to take into account a cross layer due
to the interference among wireless transmissions.
In this paper
,
w
e focus on designing and implementing
a
reliable
multicast protocol
called Me
sh Reliable Multicast Protocol (MRMP).
A
recovery tree
built
dynamically
which is joining with
the multicast routing tree.
U
sing the recovery tree
the packet losses are
repaired locally
.
This Cross layer
Technique
between network layer (
multicast routing)
and transport layer
(
reliability) using simulation
results
prove
the effectiveness
and optimization
of
cross layer
in WMNs
compare with the conventional layer
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
The Optimal way to create a protocol in Wireless Mesh Networks
is to take into account a cross layer due
to the interference among wireless transmissions.
In this paper
,
w
e focus on designing and implementing
a
reliable
multicast protocol
called Me
sh Reliable Multicast Protocol (MRMP).
A
recovery tree
built
dynamically
which is joining with
the multicast routing tree.
U
sing the recovery tree
the packet losses are
repaired locally
.
This Cross layer
Technique
between network layer (
multicast routing)
and transport layer
(
reliability) using simulation
results
prove
the effectiveness
and optimization
of
cross layer
in WMNs
compare with the conventional layer
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
Wireless sensor network (WSN) is emerging as a
major research field in computer networks over the last decade
due to its wide variety of embedded real time applications.
Sensor networks have infrastructure-less architecture because
of frequently varying topology and link status. Routing is an
extremely challenging task for battery-powered resourceconstrained
WSN, since it is main cause for energy depletion
and energy must be utilized prudently to enhance lifetime
for sensor networks. This drives a myriad of research efforts
aiming at efficient data dissemination. In this paper we
analyze how efficiently MANET specific routing protocols
OLSR (Optimized Link-State Routing protocol), DYMO
(Dynamic MANET On-demand) and ZRP (Zone Routing
Protocol) perform in IEEE 802.15.4 enabled wireless sensor
networks and evaluate their simulation results using Qualnet
simulator. Several simulations were carried out under varying
network size and offered load for performance evaluation and
relative comparison of protocols is reported in terms of average
end to end delay, throughput and jitter.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers.
We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us.
Admin@typical.in
044-43555140, 093443 99926.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSIJCNCJournal
The Quality of Service (QoS) of scheduling between latency-sensitive small data flows (a.k.a. mice) and throughput-oriented large ones (a.k.a. elephants) has become ever challenging with the proliferation of cloud-based applications. In light of this mounting problem, this work proposes a novel flow control scheme, HOLMES (HOListic Mice-Elephants Stochastic), which offers a holistic view of global congestion awareness as well as a stochastic scheduler of mixed mice-elephants data flows in Data Center Networks (DCNs). Firstly, we theoretically prove the necessity for partitioning DCN paths into sub-networks using a stochastic model. Secondly, the HOLMES architecture is proposed, which adaptively partitions the available DCN paths into low-latency and high-throughput sub-networks via a global congestion-aware scheduling mechanism. Based on the stochastic power-of-two-choices policy, the HOLMES scheduling mechanism acquires only a subset of the global congestion information, while achieves close to optimal load balance on each end-to-end DCN path. We also formally prove the stability of HOLMES flow scheduling algorithm. Thirdly, extensive simulation validates the effectiveness and dependability of HOLMES with select DCN topologies. The proposal has been in test in an industrial production environment. An extensive survey of related work is also presented.
Performance improvement for papr reduction in lte downlink system with ellipt...IJCNCJournal
This paper is concerned with the performance improvement of PAPR reduction of orthogonal frequency division multiplexing (OFDM) signal using amplitude clipping & filtering based design. Note that OFDM is one of the well adept multi-carrier multiplexing transmission scheme which has been implemented in long term evolution (LTE) downlink. Nonetheless peak to average power ratio (PAPR) is the more rattling problem with OFDM, consequently in this paper a reduction procedure of the PAPR by using amplitude clipping and filtering is proposed. Here we used IIR bandpass elliptic filter after amplitude clipping to
reduce the PAPR. The performance of the system in terms of bit error rate (BER) is also canvased as a new
filter based clipping method. Our results show that the proposed methodology of clipping method with the
IIR elliptic band pass filter significantly reduces the PAPR value.
The nature of wireless networks itself created new vulnerabilities that in the classical wired networks do
not exist. This results in an evolutional requirement to implement new sophisticated security mechanism in
form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small office
and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with use
of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to
attacker’s traffic without deployment of proposed IDPS system.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
Wireless sensor network (WSN) is emerging as a
major research field in computer networks over the last decade
due to its wide variety of embedded real time applications.
Sensor networks have infrastructure-less architecture because
of frequently varying topology and link status. Routing is an
extremely challenging task for battery-powered resourceconstrained
WSN, since it is main cause for energy depletion
and energy must be utilized prudently to enhance lifetime
for sensor networks. This drives a myriad of research efforts
aiming at efficient data dissemination. In this paper we
analyze how efficiently MANET specific routing protocols
OLSR (Optimized Link-State Routing protocol), DYMO
(Dynamic MANET On-demand) and ZRP (Zone Routing
Protocol) perform in IEEE 802.15.4 enabled wireless sensor
networks and evaluate their simulation results using Qualnet
simulator. Several simulations were carried out under varying
network size and offered load for performance evaluation and
relative comparison of protocols is reported in terms of average
end to end delay, throughput and jitter.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers.
We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us.
Admin@typical.in
044-43555140, 093443 99926.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSIJCNCJournal
The Quality of Service (QoS) of scheduling between latency-sensitive small data flows (a.k.a. mice) and throughput-oriented large ones (a.k.a. elephants) has become ever challenging with the proliferation of cloud-based applications. In light of this mounting problem, this work proposes a novel flow control scheme, HOLMES (HOListic Mice-Elephants Stochastic), which offers a holistic view of global congestion awareness as well as a stochastic scheduler of mixed mice-elephants data flows in Data Center Networks (DCNs). Firstly, we theoretically prove the necessity for partitioning DCN paths into sub-networks using a stochastic model. Secondly, the HOLMES architecture is proposed, which adaptively partitions the available DCN paths into low-latency and high-throughput sub-networks via a global congestion-aware scheduling mechanism. Based on the stochastic power-of-two-choices policy, the HOLMES scheduling mechanism acquires only a subset of the global congestion information, while achieves close to optimal load balance on each end-to-end DCN path. We also formally prove the stability of HOLMES flow scheduling algorithm. Thirdly, extensive simulation validates the effectiveness and dependability of HOLMES with select DCN topologies. The proposal has been in test in an industrial production environment. An extensive survey of related work is also presented.
Performance improvement for papr reduction in lte downlink system with ellipt...IJCNCJournal
This paper is concerned with the performance improvement of PAPR reduction of orthogonal frequency division multiplexing (OFDM) signal using amplitude clipping & filtering based design. Note that OFDM is one of the well adept multi-carrier multiplexing transmission scheme which has been implemented in long term evolution (LTE) downlink. Nonetheless peak to average power ratio (PAPR) is the more rattling problem with OFDM, consequently in this paper a reduction procedure of the PAPR by using amplitude clipping and filtering is proposed. Here we used IIR bandpass elliptic filter after amplitude clipping to
reduce the PAPR. The performance of the system in terms of bit error rate (BER) is also canvased as a new
filter based clipping method. Our results show that the proposed methodology of clipping method with the
IIR elliptic band pass filter significantly reduces the PAPR value.
The nature of wireless networks itself created new vulnerabilities that in the classical wired networks do
not exist. This results in an evolutional requirement to implement new sophisticated security mechanism in
form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small office
and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with use
of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to
attacker’s traffic without deployment of proposed IDPS system.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
This paper introduces a traffic engineering routing algorithm that aims to accept as many routing demands
as possible on the condition that a certain amount of bandwidth resource is reserved for each accepted
demand. The novel idea is to select routes based on not only network states but also information derived
from routing data such as probabilities of the ingress egress pairs and usage frequencies of the links.
Experiments with respect to acceptance ratio and computation time have been conducted against various
test sets. Results indicate that the proposed algorithm has better performance than the existing popular algorithms including Minimum Interference Routing Algorithm (MIRA) and Random Race based Algorithm for Traffic Engineering (RRATE)
.
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
MANET stands for mobile ad-hoc network that has multi-hop and dynamic nature, where each station changes its location frequently and automatically configures itself. In this paper, four routing protocols
that areOLSR,GRP,DSR, and AODV are discussed along with three TCP variants that are SACK, New Reno and Reno. The main focus of this paper is to study the impact
scalability, mobility and traffic loads on routing protocols and TCP variants. Thepaper results shows that the proactive protocols OLSR and GRP outperform the reactive protocols AODV and DSR with the same nodes size, nodes speed, and traffic load. On the other hand, the TCP variants research reveal the superiority of the TCP SACK variant over the other two variants in case of adapting to varying network size, while the TCP Reno variant acts more
robustly in varying mobility speeds and traffic loads.
A STUDY ON IMPACTS OF RTT INACCURACY ON DYNAMIC BANDWIDTH ALLOCATION IN PON A...IJCNCJournal
The circle travelling delay between OLT (Optical Line Terminal) and ONU (Optical Network Unit) is one
of most important items in dynamic bandwidth allocation (DBA) algorithms in PON, called RTT (Round
Trip Time). The RTT is taken into account when OLT assigns the start times for upstream bandwidth
grants. In most case, RTT is estimated before making bandwidth allocation decisions in dynamic bandwidth
allocation algorithms. If the estimated RTT is incorrect, the bandwidth allocation decisions are not
matched with bandwidth requests of channels. Thus, performance of PON can get worse by deviation of
RTT. There are several reasons that cause the RTT to be varying, such as processing delay, distance of
OLT and ONU, changing in fiber refractive index resulting from temperature drift, and degree of accuracy
of RTT estimation methods. In this paper, we evaluate the impacts of RTT inaccuracy on performance of
DBA and identify levels of collision and waste of bandwidth. By this way, we propose a method to remedy
the performance degradation encountered by the situation
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
To achieve a high speed data rate, higher spectral efficiency, improved services and low latency the 3rd
generation partnership project designed LTE standard (Long Term Evolution).the LTE system employs
specific technical as well the technical HARQ, MIMO transmission, OFDM Access or estimation technical.
In this paper we focus our study on downlink LTE channel estimation and specially the interpolation which
is the basis of the estimation of the channel coefficients. Thus, we propose an adaptive method for polynomial interpolation based on Lagrange polynomial. We perform the Downlink LTE system MIMO transmission then compare the obtained results with linear, Sinus Cardinal and polynomial Newton Interpolations. The simulation results show that the Lagrange method outperforms system performance in term of Block Error Rate (BLER) , throughput and EVN(%)vs. Signal to Noise Ratio (SNR).
Performance analysis and monitoring of various advanced digital modulation an...IJCNCJournal
To achieve better calculative performance in optical fiber communication and for simplicity of
implementation different digital modulation, detection and multiplexing techniques are used. These
techniques maximize the spectral efficiency. This paper reviews a tabular comparative analysis with 3D
graphical representation for different optical digital modulation formats and multiplexing techniques
within and beyond 400 Gb/s. In this particular article we survey about different parameters related to
digital fiber optic communication.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...IJCNCJournal
The SIR model is used extensively in the field of epidemiology, in particular, for the analysis of communal
diseases. One problem with SIR and other existing models is that they are tailored to random or Erdos type networks since they do not consider the varying probabilities of infection or immunity per node. In this paper, we present the application and the simulation results of the pSEIRS model that takes into account the probabilities, and is thus suitable for more realistic scale free networks. In the pSEIRS model, the death rate and the excess death rate are constant for infective nodes. Latent and immune periods are assumed to be constant and the infection rate is assumed to be proportional to I (t) N(t) , where N (t) is the size of the total population and I(t) is the size of the infected population. A node recovers from an infection
temporarily with a probability p and dies from the infection with probability (1-p).
A general stochastic information diffusion model in social networks based on ...IJCNCJournal
Social networks are an important infrastructure for information, viruses and innovations propagation. Since users’
behavior has influenced by other users’ activity, some groups of people would be made regard to similarity of users’
interests. On the other hand, dealing with many events in real worlds, can be justified in social networks; spreading
disease is one instance of them. People’s manner and infection severity are more important parameters in
dissemination of diseases. Both of these reasons derive, whether the diffusion leads to an epidemic or not. SIRS is a
hybrid model of SIR and SIS disease models to spread contamination. A person in this model can be returned to
susceptible state after it removed. According to communities which are established on the social network, we use the
compartmental type of SIRS model. During this paper, a general compartmental information diffusion model would
be proposed and extracted some of the beneficial parameters to analyze our model. To adapt our model to realistic
behaviors, we use Markovian model, which would be helpful to create a stochastic manner of the proposed model.
In the case of random model, we can calculate probabilities of transaction between states and predicting value of
each state. The comparison between two mode of the model shows that, the prediction of population would be
verified in each state.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on
the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation,
routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using
GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale
network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale
IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled
IPv6 address planning in large scale network, performance statistics of each network in terms of TCP
throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within
the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are
occurred in a real large scale dual stack network
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
Wireless sensor networks (WSNs) are large scale integration consists of hundreds or thousands or more
number of sensor nodes. They are tiny, low cost, low weight, and limited battery, primary storage,
processing power. They have wireless capabilities to monitor physical or environmental conditions. This
paper compared the performance analysis of some existing routing protocols for target tracking
application with proposed hierarchical binary tree structure to store the routing information. The sensed
information is stored in controlled way at multiple sensor nodes (e.g. node, parent node and grandparent
node) which deployed using complete binary tree data structure. This reduces traffic implosion and
geographical overlapping. Simulation result showed improved network lifetime by 20%, target detection
probability by 25%, and reduces error rate by 20%, energy efficiency, fault tolerance, and routing
efficiency. We have evaluated our proposed algorithm using NS2.
ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIOIJCNCJournal
Sensing in cognitive radio (CR) protects the primary user (PU) from bad interference. Therefore, it is
assumed to be a requirement. However, sensing has two main challenges; first the CR is required to sense
the PU under very low signal to noise ratios which will take longer sensing time, and second, some CR
nodes may suffer from deep fading and shadowing effects. Cooperative spectrum sensing (CSS) is supposed
to solve these challenges. However, CSS adds extra energy consumption due to CRs send the sensing result
to the fusion center and receive the final decision from the fusion center. This is in addition to the sensing
energy itself. Therefore, CSS may consume considerable energy out of the battery of the CR node.
Therefore in this paper, we try to find jointly the sensing time required from each CR node and the number
of CR nodes who should perform sensing such that the energy and energy efficiency (i.e., ratio of
throughput to energy consumed) are optimized. Simulation results show that the joint optimization achieves
better in terms of energy efficiency than other approaches that perform separate optimization.
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...IJCNCJournal
Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel
system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting
of multiple collections of nodes with different types of computing devices. The execution engine of the
system is open for optimizer implementations, focusing on various criteria. In this paper, we propose a new
optimizer for KernelHive, that utilizes distributed databases and performs data prefetching to optimize the
execution time of applications, which process large input data. Employing a versatile data management
scheme, which allows combining various distributed data providers, we propose using NoSQL databases
for our purposes. We support our solution with results of experiments with real executions of our OpenCL
implementation of a regular expression matching application in various hardware configurations.
Additionally, we propose a network-aware scheduling scheme for selecting hardware for the proposed
optimizer and present simulations that demonstrate its advantages.
Virtual backbone trees for most minimalIJCNCJournal
Virtual backbone trees have been used for efficient communication between sink node and any other node
in the deployed area. But all the proposed virtual backbone trees are not fully energy efficient and EVBTs
have few flaws associated with them. In this paper two such virtual backbones are proposed. The motive
behind the first algorithm, Most Minimal Energy Virtual Backbone Tree (MMEVBT), is to minimise the
energy consumption when packets are transmitted between sink and a target sensor node. The energy
consumption is most minimal and optimal and it is shown why it always has minimal energy consumption
during any transfer of packet between every node with the sink node. For every node, route path with most
minimal energy consumption is identified and a new tree node is elected only when a better minimal energy
consumption route is identified for a node to communicate with the sink and vice versa. By moving sink
periodically it is ensured the battery of the nodes near sink is not completely drained out. Another
backbone construction algorithm is proposed which maximises the network lifetime by increasing the
lifetime of all tree nodes. Simulations are done in NS2 to practically test the algorithms and the results are
discussed in detail.
Zigbee technology and its application inIJCNCJournal
Wireless home automation systems have drawn considerable attentions of the researchers for more than a
decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,
Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular
because of its low cost and low power consumption. In this paper ZigBee based wireless home automation
systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of
the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless
home automation system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future opportunities
and challenges of the ZigBee based systems have been listed in this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYcscpconf
Wireless sensor networks can be termed as a new generation of distributed embedded systems
that has a capability of meeting broad range of real-time applications. Examples include
radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few.
Wireless sensor networks that are deployed in time/mission-critical applications with highly
dynamic environments have to interact with the physical phenomenon under stringent timing
constraints and severe resource limitations. For such real-time wireless sensor networks,
designing and developing a real-time routing protocol that meets the required real-time
guarantee of data packets communication is a stimulating field of study that raised many
challenges and research issues. In this paper, we present a comprehensive survey of real-time
routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an indispensable technology. A mobile sink may be required for some applications in the sensor field, where incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual backbone network enables data collection from members of the frame and delivers it to the mobile sink. The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy consumption by 30% and delay by 9% as compared with static sink scenario.
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an
indispensable technology. A mobile sink may be required for some applications in the sensor field, where
incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and
packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend
network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a
virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual
backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual
backbone network enables data collection from members of the frame and delivers it to the mobile sink.
The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy
consumption by 30% and delay by 9% as compared with static sink scenario.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Priority based bandwidth allocation in wireless sensor networks (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Priority based bandwidth allocation in wireless sensor networks
1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
PRIORITY BASED BANDWIDTH ALLOCATION IN
WIRELESS SENSOR NETWORKS
Mary Cherian1 and T.R. Gopalakrishnan Nair2
1Department of Computer Science & Engineering, Dr.Ambedkar Institute of Technology,
Bangalore, India
2Dayananda Sagar Institutions, Bangalore, India
ABSTRACT
Most of the sensor network applications need real time communication and the need for deadline aware
real time communication is becoming eminent in these applications. These applications have different dead
line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and
need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper
we focus on the MAC layer modifications to meet the real time requirements of different priority data.
Bandwidth partitioning among different priority transmissions is implemented through MAC layer
modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution.
KEYWORDS
Wireless sensor networks, real time, priority of traffic flow, MAC layer, bandwidth allocation
1. INTRODUCTION
A wireless sensor network (WSN) comprises of sensor nodes, which monitor the terrain where
they are deployed and gather the physical environmental parameters which they communicate to
the base station [1]. The sensor nodes are densely deployed in regions where they monitor many
physical phenomena such as vibration, movement of objects, temperature, humidity, pressure,
radiations, noise levels, and light conditions. The sensor nodes self-organize to form an Ad-hoc
network after the deployment. The sensor nodes are resource constraint as these are equipped
with batteries with limited power, tiny microprocessors/microcontrollers, low power transceivers,
and sensors for gathering information about the deployed environment. When a single sensor
node is limited in its capabilities, the composition of large number of nodes offers technological
capabilities. In wireless sensor networks, individual sensor nodes are inherently unreliable and
have very limited capabilities to ensure real-time guarantees. The target is to provide more
reliable services with reduced end-to-end delays, and lower energy consumption in the underlying
sensor network. A hard real-time (HRT) system guarantees that critical tasks complete on time
[2], [3]. Here meeting a deadline is mandatory otherwise system failure occurs which may cause
catastrophic damage [4]. These systems are implemented as safety critical systems such as in
aerospace and defence. Performance of such systems cannot be compensated over any other
feature of the system. A certain amount of latency is allowed for soft-real time solutions. In such
cases the transferred data is not critical and the system used may use the soft real time solutions
for directing the information to the sink. These systems are known as non-safety critical systems
where the system deals with non critical data and use soft real time solutions for data transfer.
DOI : 10.5121/ijcnc.2014.6609 119
2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
The applications of wireless sensor networks spread in different domains viz. military, emergency
situation management, physical world, medical and health, industry, home network and
automotive. Most of the sensor network applications need real time communication and the need
for deadline aware real time communication is becoming eminent in these applications. These
applications have different dead line requirements also. Some of the challenges for real time
communication are random deployment, dynamic network topology, traffic characteristics,
resource constraints, and transient congestion.
In WSN the sensed data from the nodes may travel multiple paths towards the destination. The
available bandwidth in the channel will be portioned, and the response times will become very
lengthy [5]. The real time applications of wireless sensor networks are bandwidth sensitive and
needs higher share of bandwidth for higher priority data to meet the dead line requirements.
Through the assistance from MAC layer, the availability of multiple non-interfering and
prioritized paths can be made available to the routing algorithm. In this paper we focus on the
MAC layer modifications to achieve the real time requirements of the different priority data. In
the layered view of a network model the MAC layer should guarantee the channel access delay.
The network layer routing protocol should bind the end-to-end transmission time [6].
The remainder of the paper is organized as follows. Section 2 aims to provide a survey on the
state of the art of related MAC and routing protocols. Section 3 provides an overview of the
system. The outcomes of the implemented technique are discussed in section 4. Finally, section 5
contains some concluding remarks and the potential research directions.
2. RELATED WORK
In WSN the MAC layer has an important role in deciding the channel access delay which
contributes to the end-to end delay. Contention based protocols [6] can reduce the collisions, but a
deterministic channel access cannot be decided. On the contrary in TDMA based MAC a bounded
and predictable medium delay can be determined, but a central co-ordination is required [6]. The
original IEEE 801.11 [7] uses DCF (Distributed Coordination Function) and PCF (Point
Coordination Function). CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance is
used for the channel access. If channel is free, it waits for DIFS (Distributed inter frame space)
and transmits if still free. If channel is busy, it randomly backs off a number of Slots (minimum
15, maximum 1023). If packet transmission further fails, back-off is increased to a random
window, up to a preconfigured upper limit. But the access method neither differentiates the
different priority data nor reserves the bandwidth. PCF is centrally controlled and uses polling.
The PC (Point Coordinator) maintains the list of nodes eligible for polling. As PCF is not
compatible with all type of real time data, it is not practically used.
The protocols described in [6], S-MAC, T-MAC, B-MAC apply CSMA/CA for medium access,
but they only provide best effort service. 802.11e [8], [9] provides QoS support for wireless
networks at the MAC layer of the protocol stack and enhances the medium access functions. To
achieve hard time data delivery of the packets in addition to a HRT MAC layer, a hard real time
routing protocol is also essential. Taimur Qureshi et al. in [5] present a network Layer based Hard
Real Time Protocol for wireless sensor networks. But the protocol assumes a MAC (Medium
Access Control) layer which is collision free and with, known medium access delay. It also does
not consider the priority of the packets. Other existing real time routing protocols for WSN viz.
RAP [10], SPEED [11], R2TP [12] do not have a priority based data delivery mechanism. They
neither consider a queuing model for packet scheduling at the nodes nor allocate the bandwidth
based on the priority of the packets.
120
3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
We have presented a real time routing protocol, RRDTE in [13] which detects time critical events
in WSN. But the bandwidth allocation is not addressed in this protocol. In [14], we propose a
scheduling algorithm for sensor networks based on the packet service ratio which helps in
congestion control and flow control. But this also does not address the bandwidth partitioning
based on the priority of the packets. M.Caccamo et al., in [15] propose an implicit prioritized
access protocol, for deterministic real time communication which demands prior topological
information and synchronization. However, this is not suitable in non-deterministic environments.
In I-EDF nodes are organized in hexagonal cells. Each cell will have a unique frequency in intra-cellular
communication. The six directions of the hexagon are numbered and the communication
slots alternate with a given direction in inter-cellular communication. The rigid cell-based
organization of the topology has a limitation in real environment where there is random
deployment of sensor nodes.
Watteyne et al. in [16] present a novel hard-real time MAC protocol with realistic assumptions.
The focus is mainly on the MAC layer, as hard real-time needs to be dealt at each layer in
communication architectures. The protocol consists of an initialization phase, followed by a
run-time phase, subdivided in two modes: unprotected and protected mode. Unprotected mode
is used when collision probability is low and multi-hop propagation speed is near optimal. When
collision occurs, the network switches to a slower but collision-free protected mode. But the
protocol works only on linear topologies. This protocol also requires dedicated frequency
channels. DMAC [6], DR-MAC [6] protocols minimize the communication latency, but they are
suitable only for specific tree topologies.
CE. Perkins et al. in [20] presents the AODV, a routing protocol for Ad-Hoc networks, but
priority based data delivery is not addressed in this protocol also. Iftikhar Ahmad et al. in [21]
present a routing protocol by improvising the basic routing mechanism in AODV to assign more
bandwidth to real time traffic (RT), compared to best effort traffic (BE). The protocol reserves a
larger time slot for transmission of RT traffic than that of BE traffic. The protocol assumes only
one queue for the buffering of the packets. Here the BE traffic may be starving and may be
dropped also, if the queue fills up.
3. OVERVIEWOF THE SYSTEM
Sensor nodes share the available resources such as transmission bandwidth, buffer storage and the
processing capability. The delay and loss performance can be quantified as explained in this
subsection. When a packet or connection request arrives at a node, the node may be in a blocking
state because of the unavailability of the resources. The data packets arrive at a node in a random
manner; the time that they spend in the node is also random. Due to lack of resources, the packets
may get blocked or lost. Throughput of the system is the long-term departure rate from the
system. The average arrival rate is given by the inverse of the average inter arrival time. Little’s
formula[17] can be applied to a networking scenario also in which the system can be a network
node, transmission line, multiplexer, a switch or a network itself [18].
121
3.1. Priority queuing at the node
A queuing model is considered at the nodes where requests can belong to one of N priority
classes. When a packet arrives at the system, it joins the queue of its priority class. Each time one
packet is fetched, from the queue, the next packet to be served is selected from the head of the
line of the highest priority non empty queue. It is assumed that the arrival at each priority class is
Poisson with rate in and that the average service time of a class N customers is E [sn]. So the load
offered by class N is, ρn = in E [sn] where ρ is the utilization factor.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
122
The highest priority class (class 0) has average waiting time
E [W0] = (in E [s^2]) ∕ (1 – ρ0) (1)
So E [W0] saturates as ρ approaches 1. Thus the saturation point of class 0 is determined only by
its own load. On the other hand, the waiting time for class 1 is given
By
E [W1] = (in E [s ^2]) ∕ (1 – ρ0) (1 – ρ0 – ρ1) (2)
The class 1 queue will saturate when ρ0 + ρ1 approaches 1. Thus the class 1 queue saturation
point is affected by the class 0 load. Similarly, the class N queue saturation point depends on the
sum of the loads of the classes of priority up to N.
At the MAC layer Enhanced Distributed Channel Access (EDCA) method is used. Advantage
here is that this allows ‘tuning’ of the parameters for any specific network/application. Four
priority categories are Class 0, Class 1, Class 2, and Class 3 with Class 0 having the highest
priority. Each Access Category is equipped with a single transmit queue as depicted in Figure 1.
Table 1 Packet Priority Classes
Class Priority Traffic Type
3 Priority 3 Normal- low priority periodic data
2 Priority 2 Control data
1 Priority 1 Real-Time data
0 Priority 0 Real-Time critical data(Lowest Delay)
The MAC layer service data unit (MSDU) with UP (user priorities) which is transferred from the
higher layer (network layer) is mapped, and subsequently placed in the corresponding priority
queue. This ensures bandwidth partitioning among different priority transmissions.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
123
MSDU with UP
Mapping of MSDU to Specific Priority
Class 0 Class 1 Class 2 Class3
Figure 1. Queues with Different Priorities
The routing protocol applied is the hard real time protocol for wireless sensor networks (RPS)
which is a multipath routing protocol. Protocol discovers disjoint paths. However, the RPS
algorithm is based on the computation of dynamic routes and can handle the dynamic changes of
the networks. Delay as the metric, a source node selects its route dynamically and checks the
quality of the alternative routes.
4. SIMULATION RESULTS AND DISCUSSIONS
In this work, we consider the bandwidth allocation based on priority of the data for the
applications where sensor nodes are deployed in Ad-hoc manner to detect critical events. We
have applied the discrete event simulator (NS-2) [19] to model the behaviour of the application.
The nature of the events generated in the system is stochastic, discrete, and dynamic.
A single base station gathers data from the sensor nodes. The simulations are conducted with 32,
64,128, and 256 nodes. The wireless sensor nodes are deployed with random topology in terrains
ranging in sizes from 500meter x 500meter to 1500meter x 1500meter. The enhanced 802.11e
EDCA is employed at the MAC layer. Traffic with different priorities is generated by the
application. The bandwidth allocated to each priority data is estimated based on the simulation
results. The results of simulation with NS-2 simulator are charted below.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
Figurers 2 to 5 indicate the bandwidth allocations for different priority data for node distributions
for 32, 64, 128, and 256 nodes respectively. Figure 2 depicts the simulation results with the
number of sensor nodes as 256. The Class 0 (Priority 0) traffic with the highest priority (Table 1)
gets the highest share of bandwidth and the Class 3 (Priority 3) traffic gets the lowest share of
bandwidth. This in turn ensures that the highest priority packets are delivered with minimum
delay meeting the critical data delivery requirements.
124
Figure 2. Bandwidth allocations for different priority data for 256 nodes
Figure 3. Bandwidth allocations for different priority data for 128 nodes
7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
125
Figure 4. Bandwidth allocations for different priority data for 64 nodes
Figure 5. Bandwidth allocations for different priority data for 32 nodes
Figures 3, 4, 5 indicate the results of bandwidth allocation with 128, 64 and 32 nodes
respectively. The simulation results with 128, 64 and 32 nodes are consistent with the result of
256 nodes. The percentage of bandwidth allocated for higher priority data is higher. The critical
data which is event driven data [22], can be delivered with minimum delay meeting the
requirements of the application.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
126
Figure 6. End-to-End Delay
In figure 6 we are comparing the end-to end delay of packet delivery in our method with the
end-to end delay incurred in transmission of data packets with the AODV [20] protocol for
priority 0, the critical data. AODV is an on-demand routing protocol which is widely used for
wireless networks. This protocol has less routing and computational overheads, simplicity, and
good scalability. But the protocol does not consider QoS or reliability as demanded by the traffic
[21]. AODV does not differentiate the packets with different priority. AODV applies random
packet scheduling [23]. The end-to end delay incurred in our protocol is less than that of AODV
protocol as indicated by the graph in figure 6. The real time critical data is assigned the highest
share of bandwith and hence is delivered with minimum dealy.
5. CONCLUSION
This paper details the priority based data delivery to the sink node from the sensor nodes. In this
work, we consider the bandwidth allocation based on the priority of the data for the applications
where sensor nodes are deployed in Ad-hoc manner to detect critical events. The data generated
in WSN has different priority levels. WSNs are application specific and several applications of
WSN are designed for vital event monitoring and to ensure timeliness and reliability for the
measured environmental values [13]. The real time data has to be prioritized based on the urgency
and resources such as bandwidth needs to be allocated accordingly to ensure the timely delivery
of the data to the sink node. The bandwidth allocation for each flow depends on the QoS
requirement of the specific flow [24]. The MAC layer implements priority based medium access,
and queuing mechanism, which ensures the critical data delivery in a prioritized manner with
bandwidth partitioning among different priority transmissions. We have applied the discrete
event simulator (NS-2) to model the behavior of the system. Simulation has been conducted for
different node distributions. The results are compared with similar known technique. Our
technique reduces end-to end delay in data delivery as depicted in figure 6. Future research
direction of this work could be an enhancement to support load balancing. We have considered a
static base station and nodes in this work. Studies may be further extended for scenarios
considering the mobility of the sink, the sensor nodes or both.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
127
REFERENCES
[1] I.F. Akyildiz et al., “Wireless Sensor Networks: A Survey,” Journal of Computer Networks, vol.38,
no.4, pp. 393-422, Mar. 2002.
[2] Jane W.S. Liu, “Priority – Driven Scheduling of Periodic Tasks,” in Real Time Systems, pp. 133-
134, Pearson Education Publishers 8th reprint, 2000.
[3] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of
IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls,
Ont. , Canada, 2007.
[4] M. Cherian and T. R G. Nair, “A Deadline Aware Real-time Routing Protocol for Wireless Sensor
Networks,” International journal of Innovative Systems Design and Engineering, vol.2, no.4, pp.336-
349, Sept. 2011.
[5] T Qureshi and D.A.Zighed, “Proposition and Simulation of a Network Layer based Hard Real time
Protocol for Wireless Sensor Networks,” in Proc. of IEEE Mobile and Wireless Communications
Summit, pp. 1-5, Budapest, Hungary, 2007.
[6] Yanjun Li et al., “Real-time QoS support in wireless sensor networks: a survey ,”in Proc. of 7th
IFAC International Conference on Fieldbuses & Networks in Industrial & Embedded Systems -
FeT’2007, pp. 46-60, France, 2007.
[7] B.A. Forouzan, “Wireless LANs” in Data Communications and Networking, Tata McGraw-Hill 4th
ed., pp. 423-434, 2010.
[8] M. Lacage et al., “IEEE 802.11 rate adaptation: a practical approach,” in Proc. of 7th ACM
international symposium on Modeling, analysis and simulation of wireless and mobile systems
(MSWiM), pp. 126–134, ACM Press, New York, USA, 2004.
[9] IEEE Computer Society LAN/MAN Standards Committee, “Wireless LAN Medium Access
Control and Physical Layer Specifications-IEEE 802.11 Part-11,” pp.1-513, 2003.
[10] C. Lu et al., “RAP: A Real-time Communication Architecture for Large-Scale Wireless Sensor
Networks,” in Proc. of 8th IEEE Real-Time and Embedded Technology and Applications Symposium
(RTAS’ 02), pp.55-66, San Jose, CA, USA, 2002.
[11] T. He et al., “Speed: A stateless protocol for real-time communication in sensor networks,” in Proc. of
23rd IEEE International Conference on Distributed Computing Systems (ICDCS ‘03), pp. 46-60,
Rhode Island, USA, 2003.
[12] Kim and P. S. Joon, “Reliable and real time data dissemination in Wireless Sensor Networks,” in
Proc. of IEEE MILCOM, pp.1-5, San Diego, CA, 2008.
[13] M. Cherian and T. R G. Nair, “A Real Time Routing Protocol for Detection of Time Critical Events
in Wireless Sensor Networks,” International Journal of Scientific and Engineering Research, vol. 4,
no .9,pp. 462-468, Sept. 2013.
[14] M. Cherian and T. R. G. Nair,“A Priority based Scheduling technique for Multipath Routing in
Wireless Sensor Networks,” in Proc.of International conference on Communication and Broadband
Networking ( ICCBN 2011), pp. 925-932, Kuala Lumpur, Malaysia, Jun. 2011.
[15] M.Caccamo et al., “An implicit prioritized access protocol for wireless sensor networks”, in Proc. of
23rd IEEE Real Time System Symposium (RTSS ’02) , pp. 39-48, Austin, Texas, USA,2002.
[16] T. Watteyne and I. Augé-Blum, “Proposition of a Hard Real-Time MAC Protocol for Wireless Sensor
Networks, ” in Proc. of 13th IEEE International Symposium on Modeling, Analysis, and Simulation
of Computer and Telecommunication Systems (MASCOTS’05),pp. 533 – 536, Atlanta, Georgia,2005.
[17] J. Banks et al., “Appendix A,” in Discrete-Event System Simulation, pp. 840-859, Pearson Education
Publishers 4th ed., 2007.
[18] H. Peng et al., “An adaptive real-time routing scheme for wireless sensor networks,” in Proc. of
IEEE Advanced Information Networking and Applications Workshops, pp.918 – 922, Niagara Falls,
Ont. , Canada, 2007.
[19] The ns-2 Network Simulator. Available at http://www.isi.edu/nsnam/ns/
[20] CE. Perkins and EM. Royer, “Ad hoc on-demand distance vector routing,” in the Proc. of IEEE
Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100 , New Orleans,
LA, 1999.
[21] Iftikhar Ahmad et al., “Improved quality of service protocol for real time traffic in manet”,
International Journal of Computer Networks & Communications (IJCNC) , vol.5, no.4, pp.75-86, July
2013.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
[22] Sukumar Nandi and Aditya Yadav, “Cross Layer Adaptation for QoS in WSN”, International Journal
128
of Computer Networks & Communications (IJCNC), vol.3, no.5, pp.287-301, September, 2011.
[23] Elham Karimi and Behzad Akbari, “Priority scheduling for multipath video transmission in
WMSNS”, International Journal of Computer Networks & Communications (IJCNC), vol.5, no.6,
pp.167-180, November, 2013.
[24] M. Cherian and T. R G. Nair, “A QoS-Aware Routing Protocol for Real-time Applications in
WirelessSensor Networks,” International journal of Innovative Systems Design and Engineering,
vol.2, no.7, pp.84-93, Dec. 2011.
AUTHORS
Mary Cherian has 30 years of experience in professional field spread over education,
research and industry. She holds B.E degree in electronics and communication from
Kerala University, India and M.Tech. in computer science and engineering from
Visvesvaraya technological university Belgaum, India. She started her career in 1984 as a
research engineer in O/E/N India and has worked in the field of engineering and software
in industries like Kerala state electronics Development Corporation, Keltron controls,
Electronics Research and Development Centre, ABB and Chemtrols Software private
limited in capacities of System Engineer, System Manager and Director. Later, she concentrated on
education and contributed in academic field for the last 15 years in India and abroad educating pupil in the
field of science and technology especially in Computer Science and Engineering. Currently she is working
as Associate Professor in the department of Computer Science and Engineering in Dr. Ambedkar Institute
of Technology, Bangalore, India. She has publications in national and international conferences and
journals. Her areas of interests include Computer networks, Sensor Networks, Real time routing protocols,
and Cognitive routing. Prof Cherian has membership of professional bodies such as CSI, ISTE, IE and
IETE.
Dr. T. R. Gopalakrishnan Nair has 35 years of experience in professional field spread over
education, research and industry. He holds degrees M.Tech. from I.I.Sc., Bangalore, India
and Ph.D. in computer Science, from Kerala University, India. He started his career in
Electronics Research and Development Centre, Trivandrum, India where he was
instrumental in developing various pioneering research products in the field of computers
and software. Later, as the head of Advanced Simulation Activities in Indian Space
Research Organization, his areas of research were Critical Real-Time Systems, Inertial Navigation and
Guidance systems, Launch Vehicle Technology, High speed computing and Launch Vehicle simulations.
Later, he concentrated on education and contributed extensively in academic field for the last 14 years in
India and abroad educating pupil in the field of science and technology especially in Computer Science and
Engineering. He authored and published about 110 papers in these multidisciplinary fields and he promotes
cross domain fusion of knowledge. He has authored several book chapters at international levels and
delivered keynote and invited lectures. He is the Chief Editor of Journals "Inter JRI Science and
Technology and Inter JRI Computer Science and Networking” published by Interline Publishers. In 1992,
he received the National Technology award PARAM from the advisor to Prime Minister, for developing
the parallel computing flight simulation systems. He received the Team Tech Foundation Award for
'Excellence in Education and Research' in 2009. Dr. Nair is a senior member of IEEE for last two decades
and a member of various other societies like ACM. His areas of interests include Computer networks,
Cognitive routing, Software Engineering, Bio-Informatics, AI & Robotics and Signal and Image
Processing.